cryptologs

OKAY SO A COUPLE OF YOU (namely @ask-moonsinger, @tsukishima-tadashi, @bromillion-dollars, and @ahumanbeingdraws) wanted to hear my cryptid story so here it fuckin’ goes

SO i was in the second grade, right? and as a kid i was always fascinated by shit like cryptids and myths and legends idk why. and ONE FATEFUL DAY i happened to stumble across the tale of the jersey devil (i’m like 90% sure it was on poptropica). i think to myself, WOW HOLY SHIT I *LIVE* IN NEW JERSEY! and so i start reading up on it more. i somehow get it into my head that MAYBE, just MAYBE, if i searched for it at the fields of my elementary school, i could fucking find myself a cryptid.

but of course, i needed a team first. i recruited my friends emily and ellie, and this bitchy half-friend sarah i had at the time heard about it too so i had to include her.
i tell them all about my plans and they go along with it just fine, but it seems i forgot to mention not to tell anyone else. which is, of course, EXACTLY what sarah did. a couple more kids joined our search party every day, and slowly but surely, we had gathered the entire fucking second grade and then some to go on a wild goose chase for an urban legend.

this went on for about two fucking months, if i remember correctly. every single day, a stampede of overgrown toddlers trying to be the steve irwin of cryptozoology fucking usain bolted out of class at recess to go and hunt the jersey devil on school property.
and one day.
ONE DAY.
i distinctly remember my good pal lilly, @totallytubulars, and her good pal jimmy (god bless him), finding a torn up box on the field.
kids lost their fucking minds.
in that week alone, there was so much fucking chaos (between the supposed “thump” noise in the boxcars and the mysterious treeline to the left of the school) that the teachers literally had to force us to stop “hunting.”
but they never called anyone out for it.
and you know why?
because they didn’t know who the source was.

anyways, that’s the story of how i got the entire second grade to look for the jersey devil thank you and goodnight

The Voynich Manuscript is the world’s most secretive book. It’s dated to the 15th century and contains an unknown writing system that even renowned cryptographers have never deciphered. Illustrations in the book suggest it may cover topics like herbal remedies, biology, astronomy, and the zodiac, but no one knows for sure what it really is. Source

6

Click for full view.

Everybody else is coming up with new cats for Mutant Atsume. I decided to do something different, and so I came up with possible counterparts for the Neko Atsume food items. Thankfully, I managed to use only one pun.

As always, the idea for Mutant Atsume comes from @suprememeep’s subconscious. The images themselves were made using MS Paint, SAI, and WordPad. For my interpretations of Glunkus and Hobo, see here.

Cicada 3301 is back: Mysterious, long-running Internet puzzle re-emerges after year of silence

Wanted: willing puzzle fans to help solve the internet’s most complicated and enduring mystery. Only those conversant in hexidecimal cryptology, medieval Welsh poetry and classical music theory – among many others – need apply.

After a 12 month hiatus, Cicada 3301 – a complex collection of anonymously-set puzzles, without apparent purpose, that have nevertheless held thousands of amateur web sleuths rapt – has made a reappearance.

And the Cicada’s re-emergence is exactly on schedule, too. The first set of puzzles, identified by images of the insect, appeared on Jan. 5, 2012. A message left anonymously on notorious website 4Chan simply read: “We are looking for highly intelligent individuals. To find them, we have devised a test…”

After a series of increasingly complex riddles – ranging from cyberpunk literature to voicemail messages to posters affixed to streetlights around the globe – the mysterious organization behind the tests went quiet. Only for another set of teasers to appear exactly one year later, on Jan. 4, 2013.

La Llorona, The Weeping Woman
A powerful spirit who is cursed for her actions as a human. Folklore tells the story of a woman who drowns her young boys, enraged at their father’s infidelity. She, stricken with grief, takes her own life by jumping into a river. During this blood moon, she is rescued by a pack of Chupacabras who were once werewolves, though they were corrupted their previous leader. She learns their ways and becomes their alpha leader. Saved, though not fully alive, her vengeful spirit is locked on Earth, looking for men that have committed adultery among other crimes against women, or boys who remind her of her sons. She often kidnaps them by weeping and yelling for help. Due to this she rivals the banshee, drawing men into death rather than warning them of it. Once captured, she decides if she should kill them for justice or turn them into Chupacabras to build her pack.

This image is to be used for the purpose of the #TWCreatureFeature challenge. Reblogging is appreciated, though the original artists credit should remain intact. Thank you

-Stefan Alexander Marin
Alexander-Marin.tumblr.com

Three Problems with Deciphering the Indus Script
  1. no firm information is available about its underlying language. Was this an ancestor of Sanskrit or Dravidian, or of some other Indian language family, such as Munda, or was it a language that has disappeared? Linear B was deciphered because the tablets turned out to be in an archaic form of Greek; Mayan glyphs because Mayan languages are still spoken.
  2. no names of Indus rulers or personages are known from myths or historical records: no equivalents of Rameses or Ptolemy, who were known to those studying hieroglyphs from records of ancient Egypt available in Greek. Therefore, even if combinations of Indic symbols appear repeatedly, we have no idea what the equivalent sound might be. It could be a ruler’s name, a stream’s name, really anything.
  3. there is, as yet, no Indus bilingual inscription comparable to the Rosetta Stone (written in Egyptian and Greek). The cracking the Mayan script started in 1876 using a Spanish manuscript from the 1500s that recorded a discussion in colonial Yucatan between a Spanish priest and a Yucatec Mayan-speaking elder about ancient Mayan writing, an equivalent find to the Rosetta Stone. It is conceivable that such a bilingual inscription may exist in Mesopotamia, given its trade links with the Indus civilization, but it has not yet been discovered.
2

Click to full view.

My headcanon of these two kitties (slightly edited for more info/more clarity from these three asks that I sent; the base I used can be found here):

Glunkus legitimately doesn’t realize that they’re creepy. They just want love. Their purr sounds like the dial-up sound, but their meow is actually a perfectly normal meow. Their attributes: glitchy appearance, enthusiastic personality, power level √-1. Their memento is a metal sculpture of a Calabi-Yau space (in all 6 extra dimensions!).

Hobo’s the evil one, but in a sort of lovably ineffectual way; think Dr. Doofenshmirtz from Phineas and Ferb. Their attributes: filthy appearance, “evil” personality, power level -5. The quotation marks on “evil” are required. Their memento is a perfectly preserved dried flower crown.

Hobo actually befriended Glunkus as part of an “evil” plan, but soon actually made friends with them for real. 

Happy holidays, @suprememeep! Both of these cats are incredibly cute!

2

The PGP Word List (“Pretty Good Privacy word list”, also called a biometric word list) is a list of words for conveying data bytes in a clear unambiguous way via a voice channel. They are analogous in purpose to the NATO phonetic alphabet used by pilots, except a longer list of words is used, each word corresponding to one of the 256 unique numeric byte values.

Each byte in a bytestring is encoded as a single word. A sequence of bytes is rendered in network byte order, from left to right. For example, the leftmost (i.e. byte 0) is considered “even” and is encoded using the PGP Even Word table. The next byte to the right (i.e. byte 1) is considered “odd” and is encoded using the PGP Odd Word table. This process repeats until all bytes are encoded. Thus, “E582” produces “topmost Istanbul”, whereas “82E5” produces “miser travesty”.

A PGP public key fingerprint that displayed in hexadecimal as

    E582 94F2 E9A2 2748 6E8B
    061B 31CC 528F D7FA 3F19

would display in PGP Words (the “biometric” fingerprint) as

    topmost Istanbul Pluto vagabond
    treadmill Pacific brackish dictator
    goldfish Medusa afflict bravado
    chatter revolver Dupont midsummer
    stopwatch whimsical cowbell bottomless

The order of bytes in a bytestring depends on Endianness.

3

((OOC: The art part of Daffu’s art Collab with veraudunus ! Posting these up here because pokemon, and because I’ve been meaning to showcase these pokes up here. I won’t actually explain whom they are, because they might show up in canon in this blog at some point.

If you want to read the story that goes with these pictures, I’m going to drop off the link right here!  It was a whole lot of fun, and I still think you guys should join this group for awesome stories and art.

Answers to questions should come promptly now that work for the group is finished for the Daffu, haha XD; ))

Image: Queensland University of Technology

Cryptographers seek to protect today’s Internet from cyber-attacks decades away
Forget Terminators. Quantum computers in the future really could attack us in the past.

PETER DOCKRIL

Tomorrow’s super-fast quantum computers present somewhat of a Catch 22. While they’ll be able to perform calculations and solve problems exponentially faster than today’s most advanced computers, they have the potential to use these powers for nefarious purposes in the future.

The key risk, according to an international team of researchers, is that these super-fast computers will be equally speedy when it comes to overriding security barriers, including decrypting the encryption mechanisms we use to protect today’s internet communications.

“Governments and the computing industry are working with scientists to try to build quantum computers. It’s a very significant scientific challenge, but quantum computers could be reality in a few decades,” one of the team, cryptographer Douglas Stebila from the Queensland University of Technology (QUT) in Australiasaid in a statement. “Quantum computers will be able to solve complex scientific problems, like simulating chemical reactions, much faster than today’s most powerful supercomputers, but they’ll also be able to break much of the public key cryptography that’s used to protect Internet, mobile telephone, and other electronic communication.”

But wait a second. If these quantum computers are still decades away, why are they a threat to us now? The answer, according to Stebila, is that our current defences won’t be adequate in the future. Quantum computers won’t be able to physically travel back in time to attack us, but if they can breach today’s online defences in the future, it’s the next best thing. All the data we have now could be at risk then.

“Though quantum computers don’t exist yet, they could be used to retroactively decrypt past transmissions,” said Stebila. “That’s why it’s important that we start updating our communication infrastructure.”

It sounds like science fiction, but it makes perfect sense. All of our data online today – including personal data, banking details, and government and information – isn’t just going to disappear tomorrow. Unless we specifically take it offline, it will remain stored somewhere, and if the encryption mechanisms protecting that data remain at the same level as they are today, tomorrow’s quantum computers will make child’s play of them.

Which is why Stebila and his colleagues are looking at how to future-proof today’s Internet so it’s not at risk tomorrow. The researchers have been working on ways to strengthen the Transport Layer Security protocol currently used to encrypt data transmissions and protect Web users.

“The TLS Internet encryption protocol uses a variety of mathematical techniques to protect information, some of which would need to be updated to be resistant to quantum computers,” said Stebila. “We’ve developed a new quantum-proof version of TLS that incorporates a mathematical technique called the ‘ring learning with errors problem’, a fairly recent technique that mathematicians think has the potential to resist quantum attacks.”

The technique is detailed in a paper published at the IEEE Symposium on Security and Privacy in San Jose, California, and the researchers have made their work available as open source code on GitHub in the hope that further research and development will move the software forward.

“The speed of the new protocol is now something we will work on, but this is a big step forward, demonstrating the practicality of these new techniques,” said Stebila. “We’re optimistic this will provide a framework for developing effective ways of future-proofing our data in the world of quantum computers.”

from ScienceAlert

Decipher this!

An ADFGVX cipher was used to create this message. Help up solve it!

  1. GXGXGVVXAXADVGGVXAVXXXAVDGXXDAFXGVDXGVAXVVVXXDGAAVAXGVDXAXAXGXVXFXAGVVVDVXGVAGGGVGAXXXXXDVDXDXXVVXXFXVXFFADAVXFXGXVXXVAXXXADAXVAGVGGGAGAGXAXFVVXVAFXGXVXGAXXXFFXAVVVFGFDGADFGDXAGXAGGDAXGXGXGAVAGXVXGVGGVXAVGXGXGVFVGXGAAGAFGXXVGFGXVXVXGAVDADFDAAXGXGXVXGXGXXXGVGGDXVGAXXXXXVGGVVXAVGXGFFDFGGGVXXFGDGDVXDGDAFDGXFVVGXGXXGVXVGDVXDGAGVDVGDDXXAFADAVGFVXAVGGDXAXXGGVAAXVAXGVFXFXADXXVXFVGDGAGGXXFXGXVXXVGVAAXXVXXGXGFDADAGXAXDGGXGXAXGXGDDXGGGGGXXVAXGVDXGAFVGGVGXXGDAXVVFXAAAVXGAXXAVXAXVXDGVDXFFDXAAVXFAVXGVAVVVGDADDFXXDVGAAXXXGGVDXVAXXVAXXAGVVAGAXXVXGDAGAXVVGXAGGXXVGVGADAGVXXGGGXGDFVXAFDGVGXGDVXVXVXVVFGVAXFGDXAGGXXAFVXVAGGAFFXVXGXAXAFVAGAFAAVFFDDAXVXAAFXVXGXVGAXGXXAXAVXDXXXDFXXFGXADGXXFGXAGVFXFXGDAXDXAGVXFXVFADAXGAAXADVVFXX
youtube

A BEAUTIFUL STUDY ABOUT IMAM MAHDI (a.s) [PT. 2]


With the science of Al-Jafr (Cryptology - Numerology) I was able to find the link between Imam Mahdi (as) and the number of Prophets mentioned in the Quran … i hope you enjoy the video its not that long only 6 min :) 

Please like and reblog and spread the knowledge 

thank you guys for all the support may Allah bless you all :3 

if you have any question please don’t hesitate to ask  … 

((I feel like someone already did this but I had fun with this))

So I was watching Dipper’s Guide the Unexplained and saw that each end card was a piece of this little puzzle. The code on the bottom is in a Caesar cipher, which can be detected by the word ‘wkh’. The most common three letter word in english is ‘the’. Therefore w = t, k = h, and h = e. With this information you can hack your way through the code or you can just know that this makes it a Caesar cipher and decode from there. The code:

FROM THE FIRST UNTIL THE LAST SEARCH THE CODES OF CREDITS PAST. ONE MEANS ONE SO SEARCH THEM ALL. WELCOME TO GRAVITY FALLS. 

This message tells us to look at the numbers in read at the top of the puzzle. It wants us to look through the end cards of the episodes, but not all of them. It wants episodes 1, 2, 3, 5, 6, 9, 10, 11, 12, 13, 14, 15, 16, 20.

Now I have neither the time nor the energy to figure out the codes from these end cards so I am going to rely on someone else for that…

And what do you know! I wasn’t wrong about someone having already done this [x]

The final message is:

I WAS SO BLIND. HE LIED TO ME. THE DARKNESS IS NEAR.

So what the heckie does this mean? 

For me this puzzle parchment, handwriting, etc wise makes it look like it came out of one of the journals. The same holds true for the end cards of each of the episodes. In that case the author wrote this message in a rather irritating and convoluted way I might add.

So since we know who the author is thanks to S2 E11 then we could hazard a guess about who ‘he’ is. My guess is it could be Stan? But honestly that I was my gut reaction to reading it and honestly I’m not sure.